Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 297

Deepfake

What is Deepfake?

DeepfakeSynthetic audio, image, or video media generated by AI to convincingly depict a real person saying or doing something they did not.


Deepfakes use generative models — GANs, diffusion, and modern voice-cloning systems — to swap faces, clone voices, or fabricate entire scenes. Quality has improved fast enough that real-time video deepfakes were used in high-profile fraud cases such as the 2024 Arup incident, where attackers impersonated a CFO on a video call and authorised a USD 25 M transfer. Deepfakes drive vishing, sextortion, election interference, non-consensual intimate imagery, and identity-verification bypass. Defences combine technical detection (liveness checks, deepfake classifiers, C2PA content credentials), procedural controls (out-of-band verification of large transfers, codewords), legal regimes (EU AI Act, AI Disclosure Act drafts), and user awareness training.

Examples

  1. 01

    A video-call deepfake of an executive instructing finance staff to wire funds to a fraudulent account.

  2. 02

    A cloned voice of a CEO leaving a voicemail asking an employee to bypass approval workflows.

Frequently asked questions

What is Deepfake?

Synthetic audio, image, or video media generated by AI to convincingly depict a real person saying or doing something they did not. It belongs to the AI & ML Security category of cybersecurity.

What does Deepfake mean?

Synthetic audio, image, or video media generated by AI to convincingly depict a real person saying or doing something they did not.

How does Deepfake work?

Deepfakes use generative models — GANs, diffusion, and modern voice-cloning systems — to swap faces, clone voices, or fabricate entire scenes. Quality has improved fast enough that real-time video deepfakes were used in high-profile fraud cases such as the 2024 Arup incident, where attackers impersonated a CFO on a video call and authorised a USD 25 M transfer. Deepfakes drive vishing, sextortion, election interference, non-consensual intimate imagery, and identity-verification bypass. Defences combine technical detection (liveness checks, deepfake classifiers, C2PA content credentials), procedural controls (out-of-band verification of large transfers, codewords), legal regimes (EU AI Act, AI Disclosure Act drafts), and user awareness training.

How do you defend against Deepfake?

Defences for Deepfake typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Deepfake?

Common alternative names include: AI-generated impersonation, Synthetic media impersonation.

Related terms

See also